CINXE.COM

Search results for: identity management

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: identity management</title> <meta name="description" content="Search results for: identity management"> <meta name="keywords" content="identity management"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="identity management" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="identity management"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 11118</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: identity management</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11118</span> Who Am I at Work: Work Identity Formation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Carol%20Belle-Hallsworth">Carol Belle-Hallsworth</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Human interaction at work evolves over time and, with it, work identity. The social identity is built upon the development of its underpinning and preceding stages. Work identity can be viewed in the same way and will shift based on changes in the work environment and challenges to the work identity (threats to the four stages). This paper provides an analysis of how the stages of trust, autonomy, industry and initiative are related to the employee identity at work. Describing how they are related to each other and the development of identity. It has become common to notice changes in employee behavior during and after major operational changes in an organization. Previous studies suggest that there are emotional triggers that result in the new behaviors displayed. This study seeks to test a theoretical model by testing the relationship between the first four Erikson stages as constructs. A randomized sample of participants undertook a self-administered survey to capture information on trust, autonomy, initiative, and industry. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=work%20identity" title="work identity">work identity</a>, <a href="https://publications.waset.org/abstracts/search?q=change%20management" title=" change management"> change management</a>, <a href="https://publications.waset.org/abstracts/search?q=organizational%20management" title=" organizational management"> organizational management</a>, <a href="https://publications.waset.org/abstracts/search?q=technology%20implementation" title=" technology implementation"> technology implementation</a> </p> <a href="https://publications.waset.org/abstracts/180165/who-am-i-at-work-work-identity-formation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/180165.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">307</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11117</span> Comparison of Blockchain Ecosystem for Identity Management</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=K.%20S.%20Suganya">K. S. Suganya</a>, <a href="https://publications.waset.org/abstracts/search?q=R.%20Nedunchezhian"> R. Nedunchezhian</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In recent years, blockchain technology has been found to be the most significant discovery in this digital era, after the discovery of the Internet and Cloud Computing. Blockchain is a simple, distributed public ledger that contains all the user’s transaction details in a block. The global copy of the block is then shared among all its peer-peer network users after validation by the Blockchain miners. Once a block is validated and accepted, it cannot be altered by any users making it a trust-free transaction. It also resolves the problem of double-spending by using traditional cryptographic methods. Since the advent of bitcoin, blockchain has been the backbone for all its transactions. But in recent years, it has found its roots and uses in many fields like Smart Contracts, Smart City management, healthcare, etc. Identity management against digital identity theft has become a major concern among financial and other organizations. To solve this digital identity theft, blockchain technology can be employed with existing identity management systems, which maintain a distributed public ledger containing details of an individual’s identity containing information such as Digital birth certificates, Citizenship number, Bank details, voter details, driving license in the form of blocks verified on the blockchain becomes time-stamped, unforgeable and publicly visible for any legitimate users. The main challenge in using blockchain technology to prevent digital identity theft is ensuring the pseudo-anonymity and privacy of the users. This survey paper will exert to study the blockchain concepts, consensus protocols, and various blockchain-based Digital Identity Management systems with their research scope. This paper also discusses the role of Blockchain in COVID-19 pandemic management by self-sovereign identity and supply chain management. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=blockchain" title="blockchain">blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=consensus%20protocols" title=" consensus protocols"> consensus protocols</a>, <a href="https://publications.waset.org/abstracts/search?q=bitcoin" title=" bitcoin"> bitcoin</a>, <a href="https://publications.waset.org/abstracts/search?q=identity%20theft" title=" identity theft"> identity theft</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20identity%20management" title=" digital identity management"> digital identity management</a>, <a href="https://publications.waset.org/abstracts/search?q=pandemic" title=" pandemic"> pandemic</a>, <a href="https://publications.waset.org/abstracts/search?q=COVID-19" title=" COVID-19"> COVID-19</a>, <a href="https://publications.waset.org/abstracts/search?q=self-sovereign%20identity" title=" self-sovereign identity"> self-sovereign identity</a> </p> <a href="https://publications.waset.org/abstracts/152379/comparison-of-blockchain-ecosystem-for-identity-management" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/152379.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">130</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11116</span> The Internet of Things Ecosystem: Survey of the Current Landscape, Identity Relationship Management, Multifactor Authentication Mechanisms, and Underlying Protocols</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nazli%20W.%20Hardy">Nazli W. Hardy</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A critical component in the Internet of Things (IoT) ecosystem is the need for secure and appropriate transmission, processing, and storage of the data. Our current forms of authentication, and identity and access management do not suffice because they are not designed to service cohesive, integrated, interconnected devices, and service applications. The seemingly endless opportunities of IoT are in fact circumscribed on multiple levels by concerns such as trust, privacy, security, loss of control, and related issues. This paper considers multi-factor authentication (MFA) mechanisms and cohesive identity relationship management (IRM) standards. It also surveys messaging protocols that are appropriate for the IoT ecosystem. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=identity%20relation%20management" title="identity relation management">identity relation management</a>, <a href="https://publications.waset.org/abstracts/search?q=multifactor%20authentication" title=" multifactor authentication"> multifactor authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=protocols" title=" protocols"> protocols</a>, <a href="https://publications.waset.org/abstracts/search?q=survey%20of%20internet%20of%20things%20ecosystem" title=" survey of internet of things ecosystem"> survey of internet of things ecosystem</a> </p> <a href="https://publications.waset.org/abstracts/50501/the-internet-of-things-ecosystem-survey-of-the-current-landscape-identity-relationship-management-multifactor-authentication-mechanisms-and-underlying-protocols" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/50501.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">355</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11115</span> Central African Republic Government Recruitment Agency Based on Identity Management and Public Key Encryption</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Koyangbo%20Guere%20Monguia%20Michel%20Alex%20Emmanuel">Koyangbo Guere Monguia Michel Alex Emmanuel </a> </p> <p class="card-text"><strong>Abstract:</strong></p> In e-government and especially recruitment, many researches have been conducted to build a trustworthy and reliable online or application system capable to process users or job applicant files. In this research (Government Recruitment Agency), cloud computing, identity management and public key encryption have been used to management domains, access control authorization mechanism and to secure data exchange between entities for reliable procedure of processing files. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cloud%20computing%20network" title="cloud computing network">cloud computing network</a>, <a href="https://publications.waset.org/abstracts/search?q=identity%20management%20systems" title=" identity management systems"> identity management systems</a>, <a href="https://publications.waset.org/abstracts/search?q=public%20key%20encryption" title=" public key encryption"> public key encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=access%20control%20and%20authorization" title=" access control and authorization"> access control and authorization</a> </p> <a href="https://publications.waset.org/abstracts/50648/central-african-republic-government-recruitment-agency-based-on-identity-management-and-public-key-encryption" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/50648.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">358</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11114</span> The Impact of Type Two Diabetes and Comorbid Conditions on Self-Identity and Self-Management Practices</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Virginia%20Maskill">Virginia Maskill</a>, <a href="https://publications.waset.org/abstracts/search?q=Philippa%20Seaton"> Philippa Seaton</a>, <a href="https://publications.waset.org/abstracts/search?q=Marie%20Crowe"> Marie Crowe</a>, <a href="https://publications.waset.org/abstracts/search?q=Maree%20Inder"> Maree Inder</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A diagnosis of a chronic condition, including Type 2 diabetes can significantly impact an individual’s self-identity which in turn can have considerable implications on how they adapt to, and self-manage their condition. This paper reports on the findings from a qualitative PhD study of forty participants diagnosed with Type 2 diabetes mellitus and comorbid conditions. The primary objective of the study explored the impact conditions had on self-identity and the relationship with self-management practices. Participants were recruited from a larger study which explored the effectiveness of a therapeutic intervention on glycemic control. Interviews were audio-recorded, transcribed verbatim and analysed utilising a narrative thematic analysis methodological approach including a transitional conceptual framework. The majority of participants experienced a loss of their normal self and struggled to integrate diabetes and comorbid conditions into their self-identity. Acceptance, knowledge and integration of conditions were often found to directly influence self-management practices with individuals commonly experiencing four transitional phases from the onset of diagnosis. Successful negotiation of these four phases was influenced by a range of variables which also impacted on an individual’s self-identity and in turn their self-management practices. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=comorbidity" title="comorbidity">comorbidity</a>, <a href="https://publications.waset.org/abstracts/search?q=type%20two%20diabetes" title=" type two diabetes"> type two diabetes</a>, <a href="https://publications.waset.org/abstracts/search?q=self-identity" title=" self-identity"> self-identity</a>, <a href="https://publications.waset.org/abstracts/search?q=self-management" title=" self-management "> self-management </a> </p> <a href="https://publications.waset.org/abstracts/63811/the-impact-of-type-two-diabetes-and-comorbid-conditions-on-self-identity-and-self-management-practices" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/63811.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">331</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11113</span> Visual Identity Components of Tourist Destination</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Petra%20Barisic">Petra Barisic</a>, <a href="https://publications.waset.org/abstracts/search?q=Zrinka%20Blazevic"> Zrinka Blazevic</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the world of modern communications, visual identity has predominant influence on the overall success of tourist destinations, but despite of these, the problem of designing thriving tourist destination visual identity and their components are hardly addressed. This study highlights the importance of building and managing the visual identity of tourist destination, and based on the empirical study of well-known Mediterranean destination of Croatia analyses three main components of tourist destination visual identity; name, slogan, and logo. Moreover, the paper shows how respondents perceive each component of Croatia’s visual identity. According to study, logo is the most important, followed by the name and slogan. Research also reveals that Croatian economy lags behind developed countries in understanding the importance of visual identity, and its influence on marketing goal achievements. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=components%20of%20visual%20identity" title="components of visual identity">components of visual identity</a>, <a href="https://publications.waset.org/abstracts/search?q=Croatia" title=" Croatia"> Croatia</a>, <a href="https://publications.waset.org/abstracts/search?q=tourist%20destination" title=" tourist destination"> tourist destination</a>, <a href="https://publications.waset.org/abstracts/search?q=visual%20identity" title=" visual identity "> visual identity </a> </p> <a href="https://publications.waset.org/abstracts/6602/visual-identity-components-of-tourist-destination" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/6602.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">1050</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11112</span> The Impact of Personal Identity on Self-Esteem among Muslim Adolescents</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nadia%20Ayub">Nadia Ayub</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The purpose of the study was to explore the impact of personal identity on self-esteem among adolescents. Two hypotheses were tested in the study, i.e., personal identity effects on self-esteem; and gender difference in the variables of personal identity and self-esteem. The total of 300 (150 female; 150 male) adolescents participated in the study. Personal identity scale (Ayub, N., In Press), and self-esteem scale (Rosenberg, 1985) were administered. The findings of the study suggest that positive personal identity impact on self-esteem and gender difference was found on the variables of personal identity and self-esteem. In conclusion, the results of the study are beneficial for researchers, policymakers, psychologists. The strong positive personal identity and self-esteem help in healthy mental development not only in adolescence but throughout the life of individuals. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=personal%20identity" title="personal identity">personal identity</a>, <a href="https://publications.waset.org/abstracts/search?q=self-esteem" title=" self-esteem"> self-esteem</a>, <a href="https://publications.waset.org/abstracts/search?q=adolescents" title=" adolescents"> adolescents</a>, <a href="https://publications.waset.org/abstracts/search?q=positive%20psychology" title=" positive psychology"> positive psychology</a> </p> <a href="https://publications.waset.org/abstracts/103746/the-impact-of-personal-identity-on-self-esteem-among-muslim-adolescents" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/103746.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">401</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11111</span> The Disposable Identities; Enabling Trust-by-Design to Build Sustainable Data-Driven Value</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lorna%20Goulden">Lorna Goulden</a>, <a href="https://publications.waset.org/abstracts/search?q=Kai%20M.%20Hermsen"> Kai M. Hermsen</a>, <a href="https://publications.waset.org/abstracts/search?q=Jari%20Isohanni"> Jari Isohanni</a>, <a href="https://publications.waset.org/abstracts/search?q=Mirko%20Ross"> Mirko Ross</a>, <a href="https://publications.waset.org/abstracts/search?q=Jef%20Vanbockryck"> Jef Vanbockryck</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This article introduces disposable identities, with reference use cases and explores possible technical approaches. The proposed approach, when fully developed as an open-source toolkit, enables developers of mobile or web apps to employ a self-sovereign identity and data privacy framework, in order to rebuild trust in digital services by providing greater transparency, decentralized control, and GDPR compliance. With a user interface for the management of self-sovereign identity, digital authorizations, and associated data-driven transactions, the advantage of Disposable Identities is that they may also contain verifiable data such as the owner’s photograph, official or even biometric identifiers for more proactive prevention of identity abuse. These Disposable Identities designed for decentralized privacy management can also be time, purpose and context-bound through a secure digital contract; with verification functionalities based on tamper-proof technology. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=dentity" title="dentity">dentity</a>, <a href="https://publications.waset.org/abstracts/search?q=trust" title=" trust"> trust</a>, <a href="https://publications.waset.org/abstracts/search?q=self-sovereign" title=" self-sovereign"> self-sovereign</a>, <a href="https://publications.waset.org/abstracts/search?q=disposable%20identity" title=" disposable identity"> disposable identity</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy%20toolkit" title=" privacy toolkit"> privacy toolkit</a>, <a href="https://publications.waset.org/abstracts/search?q=decentralised%20identity" title=" decentralised identity"> decentralised identity</a>, <a href="https://publications.waset.org/abstracts/search?q=verifiable%20credential" title=" verifiable credential"> verifiable credential</a>, <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title=" cybersecurity"> cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20driven%20business" title=" data driven business"> data driven business</a>, <a href="https://publications.waset.org/abstracts/search?q=PETs" title=" PETs"> PETs</a>, <a href="https://publications.waset.org/abstracts/search?q=GDPRdentity" title=" GDPRdentity"> GDPRdentity</a>, <a href="https://publications.waset.org/abstracts/search?q=trust" title=" trust"> trust</a>, <a href="https://publications.waset.org/abstracts/search?q=self-sovereign" title=" self-sovereign"> self-sovereign</a>, <a href="https://publications.waset.org/abstracts/search?q=disposable%20identity" title=" disposable identity"> disposable identity</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy%20toolkit" title=" privacy toolkit"> privacy toolkit</a>, <a href="https://publications.waset.org/abstracts/search?q=decentralised%20identity" title=" decentralised identity"> decentralised identity</a>, <a href="https://publications.waset.org/abstracts/search?q=verifiable%20credential" title=" verifiable credential"> verifiable credential</a>, <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title=" cybersecurity"> cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20driven%20business" title=" data driven business"> data driven business</a>, <a href="https://publications.waset.org/abstracts/search?q=PETs" title=" PETs"> PETs</a>, <a href="https://publications.waset.org/abstracts/search?q=GDPRI" title=" GDPRI"> GDPRI</a> </p> <a href="https://publications.waset.org/abstracts/136294/the-disposable-identities-enabling-trust-by-design-to-build-sustainable-data-driven-value" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/136294.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">218</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11110</span> Explore Customers&#039; Perceptions of U.K. Fast Fashion Retailers&#039; Identities</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ranis%20Cheng">Ranis Cheng</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Corporate identity is an asset of a company that is unique, valuable and provides a source of competitive advantage. This research taking a holistic view to explore all dimensions of corporate identity and influence of each on customers’ shopping experience in the fast fashion retail sector in the U.K. Unfortunately these issues have not been explored sufficiently in the extant literature, especially in the area of the identity gap. To date, there is still a lack of empirical research on corporate identity, especially in the retail sector despite the importance of the concept to all organisations. Furthermore, although customer group is one of the essential audiences of organisations and the importance of customers in corporate identity management cannot be ignored, to date limited studies have been conducted in order to understand how customers interpret and perceive corporate identity (perceived identity). Therefore, this research investigates customers’ perceptions of corporate identity in the fast fashion retail sector. 1) To explore customers’ perceptions of fast fashion retailers’ corporate identities; 2) To uncover the important constructs of corporate identity which contribute to the U.K. fast fashion retail sector. 40 semi-structured interviews with the fast fashion consumers have been carried out to identify their perceptions of fast fashion retailers' corporate identities. Secondary research on retailers' websites and press releases have been evaluated to identify their desired corporate identities. The findings have revealed that there are significant gaps between how fast fashion retailers present their identities and how their consumers perceive them. This has posed customers' negative perceptions towards the retailers and their shopping experience as a whole. This study has studied how the corporate identity constructs could be applied in the fashion context and has helped retailers to shed lights on how to minimise the gap between desired and perceived identity. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=corporate%20identity" title="corporate identity">corporate identity</a>, <a href="https://publications.waset.org/abstracts/search?q=fast%20fashion" title=" fast fashion"> fast fashion</a>, <a href="https://publications.waset.org/abstracts/search?q=fashion%20retailing" title=" fashion retailing"> fashion retailing</a>, <a href="https://publications.waset.org/abstracts/search?q=identity%20gap" title=" identity gap"> identity gap</a> </p> <a href="https://publications.waset.org/abstracts/83265/explore-customers-perceptions-of-uk-fast-fashion-retailers-identities" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/83265.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">271</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11109</span> The Entrepreneurial Journey of Students: An Identity Perspective</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=J.%20Marchand">J. Marchand</a> </p> <p class="card-text"><strong>Abstract:</strong></p> While university dropout entrepreneurs are celebrated in the practitioner literature, students’ intentions of becoming entrepreneurs have increasingly been the focus of student entrepreneur studies. However, students who are already running a business have rarely been examined. The experience of these students is a phenomenon that requires further research. Entrepreneurial identity represents a gap in the organisational studies literature. This paper utilises studentpreneurs’ self-narratives of their entrepreneurial journey. More specifically, the aim is to answer the following question: what are the types of identity work that individuals go through to build their entrepreneurial identity during that journey? Through long interviews, this paper studies the lived experience of 14 studentpreneurs who have achieved $54,000 in income and who participated publicly in entrepreneurial competitions. A general inductive analysis is performed on their narrative. With its focus on the journey, this paper makes a contribution to the literature on identity work and the entrepreneurial journey. A key contribution is the study of identity work on the journey to becoming an (established) entrepreneur in contrast to routine identity work. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=entrepreneurial%20identity" title="entrepreneurial identity">entrepreneurial identity</a>, <a href="https://publications.waset.org/abstracts/search?q=student%20entrepreneur" title=" student entrepreneur"> student entrepreneur</a>, <a href="https://publications.waset.org/abstracts/search?q=identity%20work" title=" identity work"> identity work</a>, <a href="https://publications.waset.org/abstracts/search?q=student%20entrepreneurship" title=" student entrepreneurship"> student entrepreneurship</a> </p> <a href="https://publications.waset.org/abstracts/79662/the-entrepreneurial-journey-of-students-an-identity-perspective" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/79662.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">666</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11108</span> Design and Application of NFC-Based Identity and Access Management in Cloud Services</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shin-Jer%20Yang">Shin-Jer Yang</a>, <a href="https://publications.waset.org/abstracts/search?q=Kai-Tai%20Yang"> Kai-Tai Yang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In response to a changing world and the fast growth of the Internet, more and more enterprises are replacing web-based services with cloud-based ones. Multi-tenancy technology is becoming more important especially with Software as a Service (SaaS). This in turn leads to a greater focus on the application of Identity and Access Management (IAM). Conventional Near-Field Communication (NFC) based verification relies on a computer browser and a card reader to access an NFC tag. This type of verification does not support mobile device login and user-based access management functions. This study designs an NFC-based third-party cloud identity and access management scheme (NFC-IAM) addressing this shortcoming. Data from simulation tests analyzed with Key Performance Indicators (KPIs) suggest that the NFC-IAM not only takes less time in identity identification but also cuts time by 80% in terms of two-factor authentication and improves verification accuracy to 99.9% or better. In functional performance analyses, NFC-IAM performed better in salability and portability. The NFC-IAM App (Application Software) and back-end system to be developed and deployed in mobile device are to support IAM features and also offers users a more user-friendly experience and stronger security protection. In the future, our NFC-IAM can be employed to different environments including identification for mobile payment systems, permission management for remote equipment monitoring, among other applications. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cloud%20service" title="cloud service">cloud service</a>, <a href="https://publications.waset.org/abstracts/search?q=multi-tenancy" title=" multi-tenancy"> multi-tenancy</a>, <a href="https://publications.waset.org/abstracts/search?q=NFC" title=" NFC"> NFC</a>, <a href="https://publications.waset.org/abstracts/search?q=IAM" title=" IAM"> IAM</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20device" title=" mobile device"> mobile device</a> </p> <a href="https://publications.waset.org/abstracts/58826/design-and-application-of-nfc-based-identity-and-access-management-in-cloud-services" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/58826.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">435</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11107</span> The Role of Organizational Identity in Disaster Response, Recovery and Prevention: A Case Study of an Italian Multi-Utility Company</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shanshan%20Zhou">Shanshan Zhou</a>, <a href="https://publications.waset.org/abstracts/search?q=Massimo%20Battaglia"> Massimo Battaglia</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Identity plays a critical role when an organization faces disasters. Individuals reflect on their working identities and identify themselves with the group and the organization, which facilitate collective sensemaking under crisis situations and enable coordinated actions to respond to and recover from disasters. In addition, an organization’s identity links it to its regional community, which fosters the mobilization of resources and contributes to rapid recovery. However, identity is also problematic for disaster prevention because of its persistence. An organization’s ego-defenses system prohibits the rethink of its identity and a rigid identity obstructs disaster prevention. This research aims to tackle the ‘problem’ of identity by study in-depth a case of an Italian multi–utility which experienced the 2012 Northern Italy earthquakes. Collecting data from 11 interviews with top managers and key players in the local community and archived materials, we find that the earthquakes triggered the rethink of the organization’s identity, which got reinforced afterward. This research highlighted the importance of identity in disaster response and recovery. More importantly, it explored the solution of overcoming the barrier of ego-defense that is to transform the organization into a learning organization which constantly rethinks its identity. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=community%20identity" title="community identity">community identity</a>, <a href="https://publications.waset.org/abstracts/search?q=disaster" title=" disaster"> disaster</a>, <a href="https://publications.waset.org/abstracts/search?q=identity" title=" identity"> identity</a>, <a href="https://publications.waset.org/abstracts/search?q=organizational%20learning" title=" organizational learning"> organizational learning</a> </p> <a href="https://publications.waset.org/abstracts/87434/the-role-of-organizational-identity-in-disaster-response-recovery-and-prevention-a-case-study-of-an-italian-multi-utility-company" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/87434.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">732</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11106</span> The Potential of Walkability in Evoking People’s Perception of Place Identity</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ibrahim%20Shinbira">Ibrahim Shinbira</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In urban design, much has been discussed on the significance of the physical qualities in creating the place identity; however, the role of walkability as a physical quality that can evokes people's perception of place identity has not been adequately explored. This paper is based on the part findings of a doctoral research examining place identity in the city centre of Misurata, Libya. A number of 176 questionnaire and 23 face-to-face interviews were conducted with residents of the city to investigate physical qualities of place identity that evoked resident's perception. The finding demonstrates that walkability within the city centre is strong and it influences the users’ perception on the place identity. These were regarded as very important in sustaining the socio-cultural values, enjoyment, options, vitality and comfort. The paper concludes by establishing that walkability has a substantial contribution to the place identity, therefore should be considered in the design of urban places specifically the redevelopment one. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=perception" title="perception">perception</a>, <a href="https://publications.waset.org/abstracts/search?q=walkability" title=" walkability"> walkability</a>, <a href="https://publications.waset.org/abstracts/search?q=physical%20environment" title=" physical environment"> physical environment</a>, <a href="https://publications.waset.org/abstracts/search?q=place%20identity" title=" place identity"> place identity</a>, <a href="https://publications.waset.org/abstracts/search?q=residents" title=" residents"> residents</a> </p> <a href="https://publications.waset.org/abstracts/41167/the-potential-of-walkability-in-evoking-peoples-perception-of-place-identity" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/41167.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">627</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11105</span> A Review: Artificial Intelligence (AI) Driven User Access Management and Identity Governance</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rupan%20Preet%20Kaur">Rupan Preet Kaur</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This article reviewed the potential of artificial intelligence in the field of identity and access management (IAM) and identity governance and administration (IGA), the most critical pillars of any organization. The power of leveraging AI in the most complex and huge user base environment was outlined by simplifying and streamlining the user access approvals and re-certifications without any impact on the user productivity and at the same time strengthening the overall compliance of IAM landscape. Certain challenges encountered in the current state were detailed where majority of organizations are still lacking maturity in the data integrity aspect. Finally, this paper concluded that within the realm of possibility, users and application owners can reap the benefits of unified approach provided by AI to improve the user experience, improve overall efficiency, and strengthen the risk posture. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=artificial%20intelligence" title="artificial intelligence">artificial intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=user%20access%20review" title=" user access review"> user access review</a>, <a href="https://publications.waset.org/abstracts/search?q=access%20approval" title=" access approval"> access approval</a> </p> <a href="https://publications.waset.org/abstracts/174501/a-review-artificial-intelligence-ai-driven-user-access-management-and-identity-governance" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/174501.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">93</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11104</span> The Story of a Spoiled Identity: Blogging on Disability and Feminity</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Anna%20%C5%9Alebioda">Anna Ślebioda</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The paper discusses intersections between disability and femininity. Their imbrication may impede negotiation of identity. The analysis of a blog of a women with disability aims to prove this hypothesis. It involves 724 entries written in the span of six years. The conceptual framework for the considerations constitute the concepts of stigma and spoiled identity, and overlapping elements of femininity and disability. The empirical part comprises content analysis. It allows to locate the narrative on femininity and disability within the dimensions of imbricated categories described in the theoretical part. The results demonstrate aspects to consider in further research on identity in women with disabilities. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=disability" title="disability">disability</a>, <a href="https://publications.waset.org/abstracts/search?q=femininity" title=" femininity"> femininity</a>, <a href="https://publications.waset.org/abstracts/search?q=spoiled%20identity" title=" spoiled identity"> spoiled identity</a>, <a href="https://publications.waset.org/abstracts/search?q=stigma" title=" stigma"> stigma</a> </p> <a href="https://publications.waset.org/abstracts/15031/the-story-of-a-spoiled-identity-blogging-on-disability-and-feminity" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/15031.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">665</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11103</span> The Mediating Effect of Resilience on the Relationship between Cultural Identity and Self-Concordance among Tibetan, Han and Hui Students</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chunhua%20Ma">Chunhua Ma</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background: There is a relationship between cultural identity and psychological health. Resilience is an important factor of psychological health, and cultural identity will protect the resilience. The research showed that the cultural identity, resilience, and self-concordance of students from different cultures. It should be a theoretical basis to improve mental health of different nationalities students. And the role of resilience factors for adults’ cultural identity and self-concordance was deserve studied. Aims: The current study aimed to examine the relationship between cultural identity and self-concordance among Chinese academician from 3 minorities, postulating mediating by resilience. Methods: This study used cross-sectional and correlational design. Participants were 328 Chinese aged between 18 and 25 years. Data was collected via self-reports including both closed and opened questions. Results: Linear regression analysis controlling for age, gender, the result showed that: (a) Cultural identity was related to self-concordance, resilience was related to self-concordance and cultural identity was related to resilience, (b) Resilience mediated the link between cultural identity and self-concordance, respectively. Discussion: Our findings suggested that resilience and cultural identity are important factors in self-concordance. If minority college students realized the heterogeneous culture, it would alleviate their psychological conflict, stimulate their strength potential and improve their self-concordance. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cultural%20identity" title="cultural identity">cultural identity</a>, <a href="https://publications.waset.org/abstracts/search?q=resilience" title=" resilience"> resilience</a>, <a href="https://publications.waset.org/abstracts/search?q=self-concordance" title=" self-concordance"> self-concordance</a>, <a href="https://publications.waset.org/abstracts/search?q=mediating%20effect" title=" mediating effect"> mediating effect</a> </p> <a href="https://publications.waset.org/abstracts/89920/the-mediating-effect-of-resilience-on-the-relationship-between-cultural-identity-and-self-concordance-among-tibetan-han-and-hui-students" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/89920.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">411</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11102</span> Multiple Identity Construction among Multilingual Minorities: A Quantitative Sociolinguistic Case Study </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Stefanie%20Siebenh%C3%BCtter">Stefanie Siebenhütter</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper aims to reveal criterions involved in the process of identity-forming among multilingual minority language speakers in Northeastern Thailand and in the capital Bangkok. Using sociolinguistic interviews and questionnaires, it is asked which factors are important for speakers and how they define their identity by their interactions socially as well as linguistically. One key question to answer is how sociolinguistic factors may force or diminish the process of forming social identity of multilingual minority speakers. However, the motivation for specific language use is rarely overt to the speaker’s themselves as well as to others. Therefore, identifying the intentions included in the process of identity construction is to approach by scrutinizing speaker’s behavior and attitudes. Combining methods used in sociolinguistics and social psychology allows uncovering the tools for identity construction that ethnic Kui uses to range themselves within a multilingual setting. By giving an overview of minority speaker’s language use in context of the specific border near multilingual situation and asking how speakers construe identity within this spatial context, the results exhibit some of the subtle and mostly unconscious criterions involved in the ongoing process of identity construction. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=social%20identity" title="social identity">social identity</a>, <a href="https://publications.waset.org/abstracts/search?q=identity%20construction" title=" identity construction"> identity construction</a>, <a href="https://publications.waset.org/abstracts/search?q=minority%20language" title=" minority language"> minority language</a>, <a href="https://publications.waset.org/abstracts/search?q=multilingualism" title=" multilingualism"> multilingualism</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20networks" title=" social networks"> social networks</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20boundaries" title=" social boundaries"> social boundaries</a> </p> <a href="https://publications.waset.org/abstracts/114208/multiple-identity-construction-among-multilingual-minorities-a-quantitative-sociolinguistic-case-study" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/114208.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">267</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11101</span> Illuminating Regional Identity: An Interdisciplinary Exploration in Saskatchewan</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Anne%20Gibbons">Anne Gibbons</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Both inside and outside of academia, people have sought to understand the “sense of place” of various regions, many times over and for many different reasons. The concept of regional identity is highly complex and surrounded by considerable contention. There are multiple bodies of research on regional identity theory in many different disciplines and even across sub-disciplinary classifications. Each discipline takes a slightly different angle or perspective on regional identity, resulting in a fragmented body of work on this topic overall. There is a need to consolidate this body of increasingly fragmented theory through interdisciplinary integration. For the purpose of this study, the province of Saskatchewan will serve as an exemplar for exploring regional identity in a concrete context. Saskatchewan can be thought of as a ‘functional region,’ with clear boundaries and clear residency, from which regional identity can be studied. This thesis shares the outcomes of a qualitative study grounded in a series of group interviews with askatchewan residents, from which it is concluded that the use of interdisciplinary theory is an appropriate approach to the study of regional identity. Regional identity cannot be compartmentalized; it is a web of characteristics, attributes, and feelings that are inextricably linked. The thesis thus concludes by offering lessons learned about how we might better understand regional identity, as illuminated through both interdisciplinary theory and the lived experiences and imaginations of people living in the region of Saskatchewan. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=interdisciplinary" title="interdisciplinary">interdisciplinary</a>, <a href="https://publications.waset.org/abstracts/search?q=regional%20identity" title=" regional identity"> regional identity</a>, <a href="https://publications.waset.org/abstracts/search?q=Saskatchewan" title=" Saskatchewan"> Saskatchewan</a>, <a href="https://publications.waset.org/abstracts/search?q=tourism%20studies" title=" tourism studies"> tourism studies</a> </p> <a href="https://publications.waset.org/abstracts/39847/illuminating-regional-identity-an-interdisciplinary-exploration-in-saskatchewan" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/39847.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">532</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11100</span> A Factor-Analytical Approach on Identities in Environmentally Significant Behavior</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Alina%20M.%20Udall">Alina M. Udall</a>, <a href="https://publications.waset.org/abstracts/search?q=Judith%20de%20Groot"> Judith de Groot</a>, <a href="https://publications.waset.org/abstracts/search?q=Simon%20de%20Jong"> Simon de Jong</a>, <a href="https://publications.waset.org/abstracts/search?q=Avi%20Shankar"> Avi Shankar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> There are many ways in which environmentally significant behavior can be explained. Dominant psychological theories, namely, the theory of planned behavior, the norm-activation theory, its extension, the value-belief-norm theory, and the theory of habit do not explain large parts of environmentally significant behaviors. A new and rapidly growing approach is to focus on how consumer’s identities predict environmentally significant behavior. Identity may be relevant because consumers have many identities that are assumed to guide their behavior. Therefore, we assume that many identities will guide environmentally significant behavior. Many identities can be relevant for environmentally significant behavior. In reviewing the literature, over 200 identities have been studied making it difficult to establish the key identities for explaining environmentally significant behavior. Therefore, this paper first aims to establish the key identities previously used for explaining environmentally significant behavior. Second, the aim is to test which key identities explain environmentally significant behavior. To address the aims, an online survey study (n = 578) is conducted. First, the exploratory factor analysis reveals 15 identity factors. The identity factors are namely, environmentally concerned identity, anti-environmental self-identity, environmental place identity, connectedness with nature identity, green space visitor identity, active ethical identity, carbon off-setter identity, thoughtful self-identity, close community identity, anti-carbon off-setter identity, environmental group member identity, national identity, identification with developed countries, cyclist identity, and thoughtful organisation identity. Furthermore, to help researchers understand and operationalize the identities, the article provides theoretical definitions for each of the identities, in line with identity theory, social identity theory, and place identity theory. Second, the hierarchical regression shows only 10 factors significantly uniquely explain the variance in environmentally significant behavior. In order of predictive power the identities are namely, environmentally concerned identity, anti-environmental self-identity, thoughtful self-identity, environmental group member identity, anti-carbon off-setter identity, carbon off-setter identity, connectedness with nature identity, national identity, and green space visitor identity. The identities explain over 60% of the variance in environmentally significant behavior, a large effect size. Based on this finding, the article reveals a new, theoretical framework showing the key identities explaining environmentally significant behavior, to help improve and align the field. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=environmentally%20significant%20behavior" title="environmentally significant behavior">environmentally significant behavior</a>, <a href="https://publications.waset.org/abstracts/search?q=factor%20analysis" title=" factor analysis"> factor analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=place%20identity" title=" place identity"> place identity</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20identity" title=" social identity"> social identity</a> </p> <a href="https://publications.waset.org/abstracts/61651/a-factor-analytical-approach-on-identities-in-environmentally-significant-behavior" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/61651.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">451</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11099</span> Identity Management in Virtual Worlds Based on Biometrics Watermarking</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=S.%20Bader">S. Bader</a>, <a href="https://publications.waset.org/abstracts/search?q=N.%20Essoukri%20Ben%20Amara"> N. Essoukri Ben Amara</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the technological development and rise of virtual worlds, these spaces are becoming more and more attractive for cybercriminals, hidden behind avatars and fictitious identities. Since access to these spaces is not restricted or controlled, some impostors take advantage of gaining unauthorized access and practicing cyber criminality. This paper proposes an identity management approach for securing access to virtual worlds. The major purpose of the suggested solution is to install a strong security mechanism to protect virtual identities represented by avatars. Thus, only legitimate users, through their corresponding avatars, are allowed to access the platform resources. Access is controlled by integrating an authentication process based on biometrics. In the request process for registration, a user fingerprint is enrolled and then encrypted into a watermark utilizing a cancelable and non-invertible algorithm for its protection. After a user personalizes their representative character, the biometric mark is embedded into the avatar through a watermarking procedure. The authenticity of the avatar identity is verified when it requests authorization for access. We have evaluated the proposed approach on a dataset of avatars from various virtual worlds, and we have registered promising performance results in terms of authentication accuracy, acceptation and rejection rates. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=identity%20management" title="identity management">identity management</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=biometrics%20authentication%20and%20authorization" title=" biometrics authentication and authorization"> biometrics authentication and authorization</a>, <a href="https://publications.waset.org/abstracts/search?q=avatar" title=" avatar"> avatar</a>, <a href="https://publications.waset.org/abstracts/search?q=virtual%20world" title=" virtual world"> virtual world</a> </p> <a href="https://publications.waset.org/abstracts/50268/identity-management-in-virtual-worlds-based-on-biometrics-watermarking" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/50268.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">265</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11098</span> Providing a Secure, Reliable and Decentralized Document Management Solution Using Blockchain by a Virtual Identity Card</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Meet%20Shah">Meet Shah</a>, <a href="https://publications.waset.org/abstracts/search?q=Ankita%20Aditya"> Ankita Aditya</a>, <a href="https://publications.waset.org/abstracts/search?q=Dhruv%20Bindra"> Dhruv Bindra</a>, <a href="https://publications.waset.org/abstracts/search?q=V.%20S.%20Omkar"> V. S. Omkar</a>, <a href="https://publications.waset.org/abstracts/search?q=Aashruti%20Seervi"> Aashruti Seervi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In today&#39;s world, we need documents everywhere for a smooth workflow in the identification process or any other security aspects. The current system and techniques which are used for identification need one thing, that is &lsquo;proof of existence&rsquo;, which involves valid documents, for example, educational, financial, etc. The main issue with the current identity access management system and digital identification process is that the system is centralized in their network, which makes it inefficient. The paper presents the system which resolves all these cited issues. It is based on &lsquo;blockchain&rsquo; technology, which is a &#39;decentralized system&#39;. It allows transactions in a decentralized and immutable manner. The primary notion of the model is to &lsquo;have everything with nothing&rsquo;. It involves inter-linking required documents of a person with a single identity card so that a person can go anywhere without having the required documents with him/her. The person just needs to be physically present at a place wherein documents are necessary, and using a fingerprint impression and an iris scan print, the rest of the verification will progress. Furthermore, some technical overheads and advancements are listed. This paper also aims to layout its far-vision scenario of blockchain and its impact on future trends. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=blockchain" title="blockchain">blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=decentralized%20system" title=" decentralized system"> decentralized system</a>, <a href="https://publications.waset.org/abstracts/search?q=fingerprint%20impression" title=" fingerprint impression"> fingerprint impression</a>, <a href="https://publications.waset.org/abstracts/search?q=identity%20management" title=" identity management"> identity management</a>, <a href="https://publications.waset.org/abstracts/search?q=iris%20scan" title=" iris scan"> iris scan</a> </p> <a href="https://publications.waset.org/abstracts/118996/providing-a-secure-reliable-and-decentralized-document-management-solution-using-blockchain-by-a-virtual-identity-card" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/118996.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">129</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11097</span> The Georgians’ Discourses of National Identity in the Context of Europeanisation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lia%20Tsuladze">Lia Tsuladze</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The paper discusses the Georgians’ online discourses of national identity in the context of Europeanisation focusing on two periods - initialing of the EU-Georgia Association Agreement in November 2013 and signing it in June 2014. Discussing how the Georgians’ aspiration to integrate with the EU is combined with their perception of Europeanisation as a threat to the national identity, the author explores how the national sentiment is expressed in the above discourses while performed for the local vs. international audiences. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Europeanisation" title="Europeanisation">Europeanisation</a>, <a href="https://publications.waset.org/abstracts/search?q=frontstage" title=" frontstage"> frontstage</a>, <a href="https://publications.waset.org/abstracts/search?q=backstage%20discourses" title=" backstage discourses"> backstage discourses</a>, <a href="https://publications.waset.org/abstracts/search?q=Georgia" title=" Georgia"> Georgia</a>, <a href="https://publications.waset.org/abstracts/search?q=national%20identity" title=" national identity"> national identity</a> </p> <a href="https://publications.waset.org/abstracts/26982/the-georgians-discourses-of-national-identity-in-the-context-of-europeanisation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/26982.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">507</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11096</span> Role of Physical Appearance in Associating People with a Group Identity</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Gurleen%20Kaur">Gurleen Kaur</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Being tall-short, fat-thin, black-white, etc. is an inevitable part of how people perceive you. This association of people with your external appearance carves out an identity for you. This paper will look at the reasons why people relate a person to a particular categorization on the basis of his/her physical appearance. The paper delves into reasons for this categorization into groups: Subconscious grouping, personal gain, ease of relating to the group, and social acceptance. Development of certain unique physical features also leads to a person relating himself to a collective identity. Thus, this paper will support the fact that physical appearance plays a crucial role in categorization of people into groups and hence forming a group identity for them. This paper is divided into three parts. The first part will discuss what physical appearance is and how is it linked to our daily lives. The second part will talk about why it works i.e. why this factor of external appearance is important in formation of identity. The last part will talk about the factors which lead to categorization of identity because of physical appearance. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=group%20identity" title="group identity">group identity</a>, <a href="https://publications.waset.org/abstracts/search?q=physical%20appearance" title=" physical appearance"> physical appearance</a>, <a href="https://publications.waset.org/abstracts/search?q=subconscious%20grouping" title=" subconscious grouping"> subconscious grouping</a>, <a href="https://publications.waset.org/abstracts/search?q=collective%20identity" title=" collective identity "> collective identity </a> </p> <a href="https://publications.waset.org/abstracts/31643/role-of-physical-appearance-in-associating-people-with-a-group-identity" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/31643.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">419</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11095</span> Re-Reading the Impossibility of Identity: Modeling Gender Pluralism in Curriculum and Instruction</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=A.%20K.%20O%E2%80%99Loughlin">A. K. O’Loughlin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Identity doesn’t exist in discrete categories as it is defined. Kevin Kumashiro reveals the phrase 'an impossibility of identity' in Troubling Education (2000), an investigation of the intersections of culture and gender and the impact of erasure for queer POC identity. This underscores the essentiality of an insider or an outsider identity and the appearance of 'contradiction' or impossibility of these identities. The contradictions between us as subject in our own stories and in the stories of others are often silenced. This silencing of complex, 'contradicting' identity has unmissable implications in the classroom; the developing student in question is done a serious disservice, from which they may never recover. There is no more important point of contact than the teacher, for willingness to encounter a developing person as they are, not as we already think they are, or 'know' them to be, or think they should be. To decide how to regard them based on our own unilateral identity and its associated exhortations and injunctions is, as Hannah Arendt writes in The Origins of Totalitarianism (1951), to sell off our ability to rise, human-like, to the challenge of investigating things as they are. A re-reading of Kumashiro’s impossibility of identity becomes possible through the investigation of pluralism. Identities become possible and un-paradoxical by the notion that contradictions are not problems that an individual is not unilateral, but plural. In this paper, we investigate how philosophies of pluralism can inform our understanding of impossibility of identity in classroom curriculum and pedagogy. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=identity" title="identity">identity</a>, <a href="https://publications.waset.org/abstracts/search?q=gender" title=" gender"> gender</a>, <a href="https://publications.waset.org/abstracts/search?q=culture" title=" culture"> culture</a>, <a href="https://publications.waset.org/abstracts/search?q=pluralism" title=" pluralism"> pluralism</a>, <a href="https://publications.waset.org/abstracts/search?q=education" title=" education"> education</a>, <a href="https://publications.waset.org/abstracts/search?q=philosophy%20of%20education" title=" philosophy of education"> philosophy of education</a>, <a href="https://publications.waset.org/abstracts/search?q=queer%20theory" title=" queer theory"> queer theory</a>, <a href="https://publications.waset.org/abstracts/search?q=philosophy%20of%20mind" title=" philosophy of mind"> philosophy of mind</a>, <a href="https://publications.waset.org/abstracts/search?q=adolescent%20development" title=" adolescent development"> adolescent development</a> </p> <a href="https://publications.waset.org/abstracts/85728/re-reading-the-impossibility-of-identity-modeling-gender-pluralism-in-curriculum-and-instruction" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/85728.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">299</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11094</span> Examining the Functional and Practical Aspects of Iranian Painting as a Visual-Identity Language in Iranian Graphics</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Arezoo%20Seifollahi">Arezoo Seifollahi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> One of the topics that is receiving a lot of attention in artistic circles and among Iran today and has been the subject of many conversations is the issue of Iranian graphics. In this research, the functional and practical aspects of Iranian painting as a visual-identity language in Iranian graphics have been investigated by relying on Iranian cultural and social posters in order to gain an understanding of the trend of contemporary graphic art in Iran and to help us reach the identity of graphics. In order to arrive at Iranian graphics, first, the issue of identity and what it is has been examined, and then this category has been addressed in Iran and throughout the history of this country in order to reveal the characteristics of the identity that has come to us today under the name of Iranian identity cognition. In the following, the search for Iranian identity in the art of this land, especially the art of painting, and then the art of contemporary painting and the search for identity in it have been discussed. After that, Iranian identity has been investigated in Iranian graphics. To understand Iranian graphics, after a brief description of its contemporary history, this art is examined at the considered time point. By using the inductive method of examining the posters of each course and taking into account the related cultural and social conditions, we tried to get a general and comprehensive understanding of the graphic features of each course. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Iranian%20painting" title="Iranian painting">Iranian painting</a>, <a href="https://publications.waset.org/abstracts/search?q=graphic%20visual%20language" title=" graphic visual language"> graphic visual language</a>, <a href="https://publications.waset.org/abstracts/search?q=Iranian%20identity" title=" Iranian identity"> Iranian identity</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20cultural%20poster" title=" social cultural poster"> social cultural poster</a> </p> <a href="https://publications.waset.org/abstracts/185508/examining-the-functional-and-practical-aspects-of-iranian-painting-as-a-visual-identity-language-in-iranian-graphics" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/185508.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">52</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11093</span> Globalization and Women&#039;s Social Identity in Iran: A Case Study of Educated Women in the &#039;World City&#039; of Yazd</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohammad%20Tefagh">Mohammad Tefagh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The process of globalization has transformed many social and cultural phenomena and has entered the world into a new era and arena. This phenomenon has introduced new methods, ideas, and identity interactions to human beings and has caused great changes in individual and social identity. Women have also been affected by globalization. Globalization has made the presence of women more and more effective and has caused identity changes and changes in the dimensions of identity in them. The purpose of this study is to investigate the impact of globalization of culture on changes in the social identity of educated women in the global city of Yazd. This study will discuss identity change and identity reconstruction due to globalization. The method of this study is qualitative, and the research data is obtained through in-depth interviews with 15 Yazdi-educated women at the Ph.D. level. The method of data analysis is thematic analysis. Findings of the research show that educated Yazdi women have changed their identity due to new communication processes and globalization, including faster, easier, and cheaper communication with other women in the world near and far. Women's social identity has also changed in the face of elements of globalization in various dimensions such as national, gender, religious, and group identities. The analysis of the interviews revealed the confronting elements such as using new cultural goods and communication technologies, membership in social networks, and increasing awareness of environmental change. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=globalization" title="globalization">globalization</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20identity" title=" social identity"> social identity</a>, <a href="https://publications.waset.org/abstracts/search?q=educated%20women" title=" educated women"> educated women</a>, <a href="https://publications.waset.org/abstracts/search?q=Yazd" title=" Yazd"> Yazd</a> </p> <a href="https://publications.waset.org/abstracts/132806/globalization-and-womens-social-identity-in-iran-a-case-study-of-educated-women-in-the-world-city-of-yazd" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/132806.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">332</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11092</span> Fashion as Identity Architect: Sikhs in Perspective</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Anupreet%20B.%20Dugal">Anupreet B. Dugal</a>, <a href="https://publications.waset.org/abstracts/search?q=Suruchi%20Mittar"> Suruchi Mittar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The research prospect explores fashion as a tool to effectively emancipate the Sikh identity. The study presents information on how fashion has played a critical and visible role in reflecting and helping to construct identities based on religiosity. It discusses the Sikh identity, its’ origin; its continuity and the contemporary ambivalence. Fashion has mostly, if not always been used as a means of establishing identity. This research creates a gateway to discuss the impact that fashion can have on the existing socio-cultural and religious models. The study focuses on the Sikhs, a small community of India with regard to their visual appearance. The research will be based on the case study of 1469, a store infusing Sikhism as a style quotient. Subsequently, in the research framework, a sample study would be conducted with Sikh youth (18-25 years old) hailing from New Delhi, the capital city of India. 1469 formulates a striking case study for examining the relationship between fashion and religious and personal identity. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=fashion" title="fashion">fashion</a>, <a href="https://publications.waset.org/abstracts/search?q=identity" title=" identity"> identity</a>, <a href="https://publications.waset.org/abstracts/search?q=sikh%20identity" title=" sikh identity"> sikh identity</a>, <a href="https://publications.waset.org/abstracts/search?q=textiles" title=" textiles"> textiles</a> </p> <a href="https://publications.waset.org/abstracts/7058/fashion-as-identity-architect-sikhs-in-perspective" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/7058.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">477</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11091</span> Adolescent Gamers: The Relationship between Berzonsky’s Style of Identity and Immersion: Pilot Study</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Monika%20Paleczna">Monika Paleczna</a>, <a href="https://publications.waset.org/abstracts/search?q=Barbara%20Szmigielska"> Barbara Szmigielska</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Adolescence is a developmental period, covering the period from 10 to 20 years of age, in which young people face many challenges. One of the most important tasks of the adolescence period is getting a structured identity. The development of identity is possible by undertaking various activities. Nowadays, virtual activities are very common among young people. One of the main adolescents’ activities in the online environment is playing computer games. The main aim of this work is to answer the question about the relationship between the identity style of adolescents and immersion, -a phenomenon often observed while playing computer games. The concept of identity created by Berzonsky is considered as one of the best-defined concepts of identity. He defines identity as both a structure and a process and distinguishes three styles of identity: informational, normative, and diffuse/avoidant. Immersion is a concept that can be applied in a broad context, but in the game environment, it is a specific psychological experience of being involved in a computer game. It refers to the relocation of the attention resources to the game world, with a limited or impossible perception of stimuli from reality. Considering how much time adolescents spend playing computer games, the question about the relationship between their identity and the immersion in the game seems to be extremely interesting. Fifty adolescents aged 15-17 participated in the study. They played a computer game and completed the Identity Style Inventory and the Immersion Questionaire. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=identity" title="identity">identity</a>, <a href="https://publications.waset.org/abstracts/search?q=immersion" title=" immersion"> immersion</a>, <a href="https://publications.waset.org/abstracts/search?q=computer%20games" title=" computer games"> computer games</a>, <a href="https://publications.waset.org/abstracts/search?q=adolescence" title=" adolescence"> adolescence</a> </p> <a href="https://publications.waset.org/abstracts/135329/adolescent-gamers-the-relationship-between-berzonskys-style-of-identity-and-immersion-pilot-study" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/135329.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">274</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11090</span> The Appearance of Identity in the Urban Landscape by Enjoying the Natural Factors</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mehrdad%20Karimi">Mehrdad Karimi</a>, <a href="https://publications.waset.org/abstracts/search?q=Farshad%20Negintaji"> Farshad Negintaji</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study has examined the appearance of identity in the urban landscape and its effects on the natural factors. For this purpose, the components of place identity, emotional attachment, place dependence and social bond which totally constitute place attachment, measures it in three domains of cognitive (place identity), affective (emotional attachment) and behavioral (place dependence and social bond). In order to measure the natural factors, three components of the absolute elements, living entities, natural elements have been measured. The study is descriptive and the statistical population has been Yasouj, a city in Iran. To analyze the data the SPSS software has been used. The results in two level of descriptive and inferential statistics have been investigated. In the inferential statistics, Pearson correlation coefficient test has been used to evaluate the research hypotheses. In this study, the variable of identity is in high level and the natural factors are also in high level. These results indicate a positive relationship between place identity and natural factors. Development of environment and reaching the quality level of the personality or identity will develop the individual and society. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=identity" title="identity">identity</a>, <a href="https://publications.waset.org/abstracts/search?q=place%20identity" title=" place identity"> place identity</a>, <a href="https://publications.waset.org/abstracts/search?q=landscape" title=" landscape"> landscape</a>, <a href="https://publications.waset.org/abstracts/search?q=urban%20landscape" title=" urban landscape"> urban landscape</a>, <a href="https://publications.waset.org/abstracts/search?q=landscaping" title=" landscaping"> landscaping</a> </p> <a href="https://publications.waset.org/abstracts/14399/the-appearance-of-identity-in-the-urban-landscape-by-enjoying-the-natural-factors" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/14399.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">516</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11089</span> The Analysis of the Role of Handicrafts in Consolidating Iran National Identity</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nadia%20Pourabbas%20Tahvildari">Nadia Pourabbas Tahvildari</a> </p> <p class="card-text"><strong>Abstract:</strong></p> National identity is formed in the process of time and in the community while influenced by the historical events. The country which has a more coherent national and historical identity would be successful as well as strengthening solidarity and social cohesion. Among the international community where the various likes challenge the subject of identity, taking into consideration the components which using identity seems to be very critical. Handicrafts as reflecting the historical and cultural characteristics of the product location can be used as an important component in order to introduce the culture and identity to be evaluated. As one of the most durable crafts for man, handicrafts have played a continuous role in sustaining human culture. Today without the presence of handicrafts, restoration of culture and national identity and religious beliefs of the past clans and people, is not only difficult but is even impossible also. Due to its brilliant historical experience and having rich culture and civilization, Iran has accomplished to the high competence in the field of traditional arts and handicrafts. This article is a scientific approach which by using descriptive – analytic method based on library studies tried to address the issue of handicrafts looking to examine the position of the industry to consolidate the national identity. Studies indicate that Iran as one of the original human habitats in the field of handicrafts has adequate enrichment and in case there will be an appropriate planning and investment away from oil-based industry, it would be beneficent. Furthermore, the quality and variety of handicrafts can be used as an essential yardstick for the consolidation of Iran national identity in the age of globalization. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=handicrafts" title="handicrafts">handicrafts</a>, <a href="https://publications.waset.org/abstracts/search?q=Iran%20national%20identity" title=" Iran national identity"> Iran national identity</a>, <a href="https://publications.waset.org/abstracts/search?q=globalization" title=" globalization"> globalization</a>, <a href="https://publications.waset.org/abstracts/search?q=cultural%20heritage" title=" cultural heritage"> cultural heritage</a> </p> <a href="https://publications.waset.org/abstracts/35660/the-analysis-of-the-role-of-handicrafts-in-consolidating-iran-national-identity" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/35660.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">730</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=identity%20management&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=identity%20management&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=identity%20management&amp;page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=identity%20management&amp;page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=identity%20management&amp;page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=identity%20management&amp;page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=identity%20management&amp;page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=identity%20management&amp;page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=identity%20management&amp;page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=identity%20management&amp;page=370">370</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=identity%20management&amp;page=371">371</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=identity%20management&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10